CVE-2023-53854
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mediatek | mt8186 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the MediaTek mt8186 audio driver within the Linux kernel. It occurs because the driver incorrectly manages the order of resource cleanup during device removal. Specifically, the driver uses devm_add_action_or_reset() improperly, causing resources to be freed in the wrong order, leading to a use-after-free condition. The problem arises because the removal functions are called in reverse order, but the driver did not account for this correctly, resulting in accessing freed memory. The fix involves adjusting the placement of devm_add_action_or_reset() to ensure resources are released in the correct order, also preventing a potential resource leak.
How can this vulnerability impact me? :
This use-after-free vulnerability can lead to undefined behavior in the kernel, such as system crashes, memory corruption, or potential escalation of privileges if exploited. Since it affects the audio driver, it could cause instability or denial of service related to audio functionality on devices using the MediaTek mt8186 chipset. Exploiting this flaw might allow an attacker to execute arbitrary code within the kernel context or cause a system crash.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the use-after-free issue in the mediatek mt8186 audio driver. The fix involves correcting the order of devm resource management calls in the driver remove path, specifically moving devm_add_action_or_reset() to the correct place to prevent use-after-free and resource leaks.